Re: [whatwg] Fullscreen

2011-10-04 Thread Anne van Kesteren
On Mon, 03 Oct 2011 18:52:24 +0200, Tantek Çelik tan...@cs.stanford.edu  
wrote:
Fullscreen is currently #2 in my queue after getting another LCWD of  
CSS3-UI out.


Cool!


I've been incrementally editing on the wiki page you mentioned until  
it's my primary focus.


Feel free to make edits to the wiki if there are particular aspects you  
want to improve or raise as issues.


Thanks, will do.


Either way, though I sympathize with the desire to get rid of prefixes,  
there are other aspects (besides spec (re)formatting/massaging from wiki  
to W3C WD) that need more help if prefix-removal is your primary goal,  
e.g. we don't have a Fullscreen test suite nor even someone to  
curate/coordinate the creation of one - is that something you'd be  
available to help with?


I'm (and Opera is too) primarily interested in getting a somewhat more  
formal specification. I'm willing to help out with writing tests, but I  
have no ideas on how to test this in an automated way (apart from simple  
IDL tests).



--
Anne van Kesteren
http://annevankesteren.nl/


[whatwg] document.all quickiness

2011-10-04 Thread João Eiras


Hi !

The spec for HTMLAllCollection [1] says The HTMLAllCollection interface  
represents a generic collection of elements.


After some quick testing in IE [2], IE returns the doctype, processing  
instructions and comment nodes too. If converts them all to comments but  
that's something else we shouldn't even touch with a long stick.


I would suggest that the spec be updated to match IE better.

Thank you.

[1]  
http://www.whatwg.org/specs/web-apps/current-work/multipage/common-dom-interfaces.html#htmlallcollection-0


[2] http://dl.dropbox.com/u/9681493/procinsts.html


[whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Odin Hørthe Omdal

If the CORS-check did not succeed on img
src=http://crossorigin.example.net crossorigin, this should happen
according to spec:

Discard all fetched data and prevent any tasks from the fetch algorithm  
from being queued. For the purposes of the calling algorithm, the user  
agent must act as if there was a fatal network error and no resource was  
obtained. If a CORS resource sharing check failed, the user agent may  
report a cross-origin resource access failure to the user (e.g. in a  
debugging console).


http://www.whatwg.org/specs/web-apps/current-work/multipage/urls.html#potentially-cors-enabled-fetch


In this scenario an author wanting to do some canvas processing with the
image, will be able to check img.onerror to see whether she can use that
image. The image won't load on a failed check. Gecko does this.

WebKit, on the other hand, only taints the image and loads it anyway,
breaking the spec. The error will instead crop up in a way that is more
verbose and harder to miss when she tries to read the image data out.


Is WebKit's method a lesser surprise than the image just not showing up
(if they don't check for thrown error)? It'd be nice to hear why it's
implemented like that, if there are any good reasons. WebKit's method
seemed most obvious to me at first, but after investigating a bit I'm not
sure anymore...

--
Odin Hørthe Omdal
Core QA, Opera Software


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Ian Hickson
On Tue, 4 Oct 2011, Odin Hørthe Omdal wrote:

 If the CORS-check did not succeed on img
 src=http://crossorigin.example.net crossorigin, this should happen
 according to spec:
 
  Discard all fetched data and prevent any tasks from the fetch algorithm from
  being queued. For the purposes of the calling algorithm, the user agent must
  act as if there was a fatal network error and no resource was obtained. If a
  CORS resource sharing check failed, the user agent may report a cross-origin
  resource access failure to the user (e.g. in a debugging console).
 
 http://www.whatwg.org/specs/web-apps/current-work/multipage/urls.html#potentially-cors-enabled-fetch
 
 
 In this scenario an author wanting to do some canvas processing with the
 image, will be able to check img.onerror to see whether she can use that
 image. The image won't load on a failed check. Gecko does this.
 
 WebKit, on the other hand, only taints the image and loads it anyway,
 breaking the spec. The error will instead crop up in a way that is more
 verbose and harder to miss when she tries to read the image data out.
 
 
 Is WebKit's method a lesser surprise than the image just not showing up 
 (if they don't check for thrown error)? It'd be nice to hear why it's 
 implemented like that, if there are any good reasons. WebKit's method 
 seemed most obvious to me at first, but after investigating a bit I'm 
 not sure anymore...

The idea is that if the server explicitly rejected the CORS request, then 
the image should not be usable at all.

-- 
Ian Hickson   U+1047E)\._.,--,'``.fL
http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'

Re: [whatwg] document.all quirkiness

2011-10-04 Thread João Eiras

On Tue, 04 Oct 2011 19:58:56 +0200, João Eiras jo...@opera.com wrote:



Hi !

The spec for HTMLAllCollection [1] says The HTMLAllCollection  
interface represents a generic collection of elements.


After some quick testing in IE [2], IE returns the doctype, processing  
instructions and comment nodes too. If converts them all to comments but  
that's something else we shouldn't even touch with a long stick.


I would suggest that the spec be updated to match IE better.



After further testing (and getting someone to test in IE9), IE9 only  
returns Elements, even in quirks mode, so I presume the change is not  
needed.


Thanks.


[whatwg] HTMLLinkElement.disabled and HTMLLinkElement.sheet behavior

2011-10-04 Thread Julien Chaffraix
Hi everyone,

following WebKit's attempt at implementing the behavior of |sheet| and
|disabled| per HTML5 / CSSOM [1], we have found that the specs [2] [3]
either under-specify the behavior or do not match what browsers are
doing.

Here are the behaviors seen during testing:
* IE9 does not support link.sheet.
* Opera and FF always have an associated stylesheet if |link.rel|
matches a stylesheet and |href| is set.
* They both fill link.sheet with default values even if the stylesheet
was / ends up in error.
* However, FF loads the stylesheet synchronously whereas Opera does it
asynchronously from a JS perspective
* Some websites (4chan.org for examples) assumes that the |sheet| is
always available and that |disabled| will work properly regardless of
when it is called.

We ended up reverting our changes due to incompatibilities seen in the
wild and seek the spec amended before resuming our implementation in a
compatible manner.

Thanks,
Julien

[1] https://bugs.webkit.org/show_bug.cgi?id=65140 (see in particular
comments #26 [our reading of the spec] and #29 [some findings summed
up here for easier reading])
[2] 
http://www.whatwg.org/specs/web-apps/current-work/multipage/semantics.html#dom-link-disabled
[3] http://dev.w3.org/csswg/cssom/#the-linkstyle-interface


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Anne van Kesteren

On Tue, 04 Oct 2011 20:32:02 +0200, Ian Hickson i...@hixie.ch wrote:

The idea is that if the server explicitly rejected the CORS request, then
the image should not be usable at all.


FWIW, from a CORS-perspective both scenarios are fine. CORS only cares  
about whether data gets shared in the end. One advantage I can see about  
img crossorigin still displaying the image is that the request does not  
use cookies. Not displaying the image probably makes debugging easier  
however.



--
Anne van Kesteren
http://annevankesteren.nl/


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 2:32 PM, Odin Hørthe Omdal wrote:

WebKit, on the other hand, only taints the image and loads it anyway,
breaking the spec.


File a bug on them please?  The idea of CORS is that CORS-using requests 
stop making the harmful distinction between ability to embed and ability 
to read.  That's why CORS had to be opt-in for images.  If WebKit is not 
implenenting this properly, they just need to fix their code...


And in particular an img crossorigin that's in the DOM and fails the 
CORS checks should not render the image on the page.  Anything else is 
just broken.


-Boris


Re: [whatwg] HTMLLinkElement.disabled and HTMLLinkElement.sheet behavior

2011-10-04 Thread Boris Zbarsky

On 10/4/11 2:41 PM, Julien Chaffraix wrote:

* However, FF loads the stylesheet synchronously whereas Opera does it
asynchronously from a JS perspective


Uh...  Firefox does not load anything synchronously.

What Firefox does do is block execution of script tags (but not 
timeouts, callbacks, etc!) if there are pending non-altenate 
parser-inserted stylesheet loads.  This is necessary to make sure that 
scripts getting layout properties see the effect of those stylesheets. 
A side-effect is that a script coming after a link will never see 
the link in an unloaded state... unless there's a network error for the 
link or whatever.



* Some websites (4chan.org for examples) assumes that the |sheet| is
always available and that |disabled| will work properly regardless of
when it is called.


OK.  That behavior is allowed by the spec as far as I can tell.


We ended up reverting our changes due to incompatibilities seen in the
wild and seek the spec amended before resuming our implementation in a
compatible manner.


What specific changes do you want to the spec?  As far as I can tell, 
right now the spec says nothing about when sheets become associated and 
that this would need to be defined, right?  Anything else?


-Boris



Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 2:44 PM, Anne van Kesteren wrote:

On Tue, 04 Oct 2011 20:32:02 +0200, Ian Hickson i...@hixie.ch wrote:

The idea is that if the server explicitly rejected the CORS request, then
the image should not be usable at all.


FWIW, from a CORS-perspective both scenarios are fine. CORS only cares
about whether data gets shared in the end.


Displaying images involves sharing data, basically.  That's why we're 
having to jump through all these hoops


-Boris


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Anne van Kesteren

On Tue, 04 Oct 2011 20:55:28 +0200, Boris Zbarsky bzbar...@mit.edu wrote:

On 10/4/11 2:44 PM, Anne van Kesteren wrote:

On Tue, 04 Oct 2011 20:32:02 +0200, Ian Hickson i...@hixie.ch wrote:
The idea is that if the server explicitly rejected the CORS request,  
then

the image should not be usable at all.


FWIW, from a CORS-perspective both scenarios are fine. CORS only cares
about whether data gets shared in the end.


Displaying images involves sharing data, basically.  That's why we're  
having to jump through all these hoops


Sure, but not more than per usual. Note that if you do not specify the  
crossorigin attribute the image can still get untainted. And if it does  
not you would still display the image (as always).



--
Anne van Kesteren
http://annevankesteren.nl/


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Kenneth Russell
On Tue, Oct 4, 2011 at 11:55 AM, Boris Zbarsky bzbar...@mit.edu wrote:
 On 10/4/11 2:44 PM, Anne van Kesteren wrote:

 On Tue, 04 Oct 2011 20:32:02 +0200, Ian Hickson i...@hixie.ch wrote:

 The idea is that if the server explicitly rejected the CORS request, then
 the image should not be usable at all.

 FWIW, from a CORS-perspective both scenarios are fine. CORS only cares
 about whether data gets shared in the end.

 Displaying images involves sharing data, basically.  That's why we're having
 to jump through all these hoops

As far as I can tell the tainting behavior WebKit implements is
correct, and is specified by the text in
http://www.whatwg.org/specs/web-apps/current-work/multipage/embedded-content-1.html#the-img-element
. Scroll down to step 6 in the algorithm for When the user agent is
to update the image data Note that the default origin behaviour
is set to taint when fetching images.

-Ken


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 3:02 PM, Anne van Kesteren wrote:

Sure, but not more than per usual. Note that if you do not specify the
crossorigin attribute the image can still get untainted. And if it does
not you would still display the image (as always).


Yes; the point of specifying crossorigin is to opt in to the security 
model we think the web _should_ have but that we can't roll out across 
the board.  Yet.


-Boris



Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 3:04 PM, Kenneth Russell wrote:

As far as I can tell the tainting behavior WebKit implements is
correct, and is specified by the text in
http://www.whatwg.org/specs/web-apps/current-work/multipage/embedded-content-1.html#the-img-element
. Scroll down to step 6 in the algorithm for When the user agent is
to update the image data Note that the default origin behaviour
is set to taint when fetching images.


default origin behavior is only relevant when the mode is No CORS. 
See 
http://www.whatwg.org/specs/web-apps/current-work/multipage/fetching-resources.html#potentially-cors-enabled-fetch


So for images it only applies when the crossorigin attribute is not set.

So no, WebKit's implementation is not correct if you were trying to 
implement the spec.


In particular, if crossorigin is set, you end up at 
http://www.whatwg.org/specs/web-apps/current-work/multipage/fetching-resources.html#potentially-cors-enabled-fetch 
step 3 item 1 in the 'If mode is Anonymous or Use Credentials' 
section, which is exactly what was cited in the mail that started this 
thread.


-Boris


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Anne van Kesteren

On Tue, 04 Oct 2011 21:06:29 +0200, Boris Zbarsky bzbar...@mit.edu wrote:
Yes; the point of specifying crossorigin is to opt in to the security  
model we think the web _should_ have but that we can't roll out across  
the board.  Yet.


Well, what you think it should have is not shared by me.


--
Anne van Kesteren
http://annevankesteren.nl/


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 3:14 PM, Anne van Kesteren wrote:

On Tue, 04 Oct 2011 21:06:29 +0200, Boris Zbarsky bzbar...@mit.edu wrote:

Yes; the point of specifying crossorigin is to opt in to the security
model we think the web _should_ have but that we can't roll out across
the board. Yet.


Well, what you think it should have is not shared by me.


That's fine.  Then you need a better proposal for the various security 
bugs involved.  I'm all ears.


-Boris




Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Ian Hickson
On Tue, 4 Oct 2011, Anne van Kesteren wrote:
 On Tue, 04 Oct 2011 20:32:02 +0200, Ian Hickson i...@hixie.ch wrote:
  The idea is that if the server explicitly rejected the CORS request, 
  then the image should not be usable at all.
 
 FWIW, from a CORS-perspective both scenarios are fine. CORS only cares 
 about whether data gets shared in the end. One advantage I can see about 
 img crossorigin still displaying the image is that the request does 
 not use cookies. Not displaying the image probably makes debugging 
 easier however.

On Tue, 4 Oct 2011, Boris Zbarsky wrote:
 
 Displaying images involves sharing data, basically.  That's why we're 
 having to jump through all these hoops

On Tue, 4 Oct 2011, Anne van Kesteren wrote:
 
 Sure, but not more than per usual. Note that if you do not specify the 
 crossorigin attribute the image can still get untainted. And if it does 
 not you would still display the image (as always).

The thing is that you can grab the image data (at least the alpha channel 
using 2D canvas) from these images, even with tainting enabled, so if the 
server says no, we really should honour it.


On Tue, 4 Oct 2011, Boris Zbarsky wrote:
 
 And in particular an img crossorigin that's in the DOM and fails the 
 CORS checks should not render the image on the page.  Anything else is 
 just broken.

Agreed.

-- 
Ian Hickson   U+1047E)\._.,--,'``.fL
http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Ian Hickson
On Tue, 4 Oct 2011, Kenneth Russell wrote:
 
 As far as I can tell the tainting behavior WebKit implements is correct, 
 and is specified by the text in 
 http://www.whatwg.org/specs/web-apps/current-work/multipage/embedded-content-1.html#the-img-element
  
 . Scroll down to step 6 in the algorithm for When the user agent is to 
 update the image data Note that the default origin behaviour is 
 set to taint when fetching images.

If you do a CORS-enabled fetch, you never get that far. If the CORS check 
fails, the browser is required to act as if a network error occurred.

http://www.whatwg.org/specs/web-apps/current-work/#potentially-cors-enabled-fetch

-- 
Ian Hickson   U+1047E)\._.,--,'``.fL
http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'


Re: [whatwg] [MIME Sniffing] Editorial feedback

2011-10-04 Thread timeless
 Comparisons between media types, as defined by MIME specifications, are done 
 in an ASCII case-insensitive manner. [RFC2046]

so, the problem is that your `note` here is ambiguous

it's hard to understand that you're just saying `mime rfc says that
mime comparisons are insensitive`,
v. `this specification wants mime comparisons to be insensitive`

you want the former; but `note:` doesn't cause that result; nor does
the `[rfc]` at the end

 I'm tempted to just rename them to be less semantic.  They're just symbols 
 that don't mean anything, really.

please do :)

 That's a lot of editing!  I'm not sure that buys us much.

i ask, because it actually was useful when i was dealing w/ someone else's spec
they had hex digits and some of them were wrong
it was much easier to read when the hex digits were in tt

 That is intentional.  Sniffing SWF is bad times.

i think it might be worth an actual NOTE in the spec explaining that
SWF is intentionally not sniffed, and what that means for untyped SWF
files (actually explaining how it flows and to which resulting sniff
type)

 Thanks to Alfred HÎnes Boris Zbarsky David Singer Mark Pilgrim, and Russ Cox.

you  need some punctuation before `Boris`, `David`, and `Mark` :)

 If RDF-flag is 1 and RSS-flag is 1, then let the sniffed-type be 
 application/rss+xml and abort these steps.

could you change that to: If both RDF-flag and RSS-flag are 1, then ...?


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Kenneth Russell
On Tue, Oct 4, 2011 at 12:11 PM, Boris Zbarsky bzbar...@mit.edu wrote:
 default origin behavior is only relevant when the mode is No CORS. See

http://www.whatwg.org/specs/web-apps/current-work/multipage/fetching-resources.html#potentially-cors-enabled-fetch

 So for images it only applies when the crossorigin attribute is not set.

 So no, WebKit's implementation is not correct if you were trying to
 implement the spec.

 In particular, if crossorigin is set, you end up at

http://www.whatwg.org/specs/web-apps/current-work/multipage/fetching-resources.html#potentially-cors-enabled-fetch
 step 3 item 1 in the 'If mode is Anonymous or Use Credentials'
section,
 which is exactly what was cited in the mail that started this thread.

Right, I see now. Sorry.

On Tue, Oct 4, 2011 at 12:10 PM, Ian Hickson i...@hixie.ch wrote:

 On Tue, 4 Oct 2011, Anne van Kesteren wrote:
  On Tue, 04 Oct 2011 20:32:02 +0200, Ian Hickson i...@hixie.ch wrote:
   The idea is that if the server explicitly rejected the CORS request,
   then the image should not be usable at all.
 
  FWIW, from a CORS-perspective both scenarios are fine. CORS only cares
  about whether data gets shared in the end. One advantage I can see about
  img crossorigin still displaying the image is that the request does
  not use cookies. Not displaying the image probably makes debugging
  easier however.

 On Tue, 4 Oct 2011, Boris Zbarsky wrote:
 
  Displaying images involves sharing data, basically.  That's why we're
  having to jump through all these hoops

 On Tue, 4 Oct 2011, Anne van Kesteren wrote:
 
  Sure, but not more than per usual. Note that if you do not specify the
  crossorigin attribute the image can still get untainted. And if it does
  not you would still display the image (as always).

 The thing is that you can grab the image data (at least the alpha channel
 using 2D canvas) from these images, even with tainting enabled, so if the
 server says no, we really should honour it.


I don't think that this is a good argument for the currently specified
behavior. The server only has the option of declining cross-origin access if
the application specified the crossorigin attribute. A hostile application
would simply not specify that attribute, would receive the tainted image,
and would use the timing attack I assume you're referring to to infer the
alpha channel.

The far more common case today is that the server doesn't understand the
CORS request, not that it explicitly forbids cross-origin access to the
resource.

It seems to me that tainting the image if the CORS check fails is more
graceful behavior, but I also see the advantages in early error reporting.

Odin, if you file a bug on bugs.webkit.org, would you CC my email address?

-Ken

On Tue, 4 Oct 2011, Boris Zbarsky wrote:
 
  And in particular an img crossorigin that's in the DOM and fails the
  CORS checks should not render the image on the page.  Anything else is
  just broken.

 Agreed.

 --
 Ian Hickson   U+1047E)\._.,--,'``.fL
 http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
 Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'



Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 4:24 PM, Kenneth Russell wrote:

I don't think that this is a good argument for the currently specified
behavior. The server only has the option of declining cross-origin
access if the application specified the crossorigin attribute.


A server has the option of declining _all_ non CORS request (e.g. all 
requests without an Origin header).  Servers that care about others 
getting at their images should do so.  Of course that relies on all UAs 
implementing @crossorigin so that servers can require it when linking to 
their images...  But once we get there, this becomes a quite viable 
strategy for the server to avoid leaking their images.


-Boris


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Anne van Kesteren

On Tue, 04 Oct 2011 23:15:01 +0200, Boris Zbarsky bzbar...@mit.edu wrote:
A server has the option of declining _all_ non CORS request (e.g. all  
requests without an Origin header).  Servers that care about others  
getting at their images should do so.  Of course that relies on all UAs  
implementing @crossorigin so that servers can require it when linking to  
their images...  But once we get there, this becomes a quite viable  
strategy for the server to avoid leaking their images.


I think http://dvcs.w3.org/hg/from-origin/raw-file/tip/Overview.html is a  
better strategy for achieving that. The advantage being that only changes  
on the server are required.



--
Anne van Kesteren
http://annevankesteren.nl/


Re: [whatwg] HTMLLinkElement.disabled and HTMLLinkElement.sheet behavior

2011-10-04 Thread Julien Chaffraix
 * However, FF loads the stylesheet synchronously whereas Opera does it
 asynchronously from a JS perspective

 Uh...  Firefox does not load anything synchronously.

 What Firefox does do is block execution of script tags (but not timeouts,
 callbacks, etc!) if there are pending non-altenate parser-inserted
 stylesheet loads.  This is necessary to make sure that scripts getting
 layout properties see the effect of those stylesheets. A side-effect is that
 a script coming after a link will never see the link in an unloaded
 state... unless there's a network error for the link or whatever.

Thanks for the explanation. I took a black-box approach in testing - I
don't pretend to know how Firefox works - and from that perspective,
it looked like it was synchronous as the |sheet| was present and
properly populated in JS.

 * Some websites (4chan.org for examples) assumes that the |sheet| is
 always available and that |disabled| will work properly regardless of
 when it is called.

 OK.  That behavior is allowed by the spec as far as I can tell.

It is. However the specification states that |disabled| would be
ignored if there is no |sheet|. It looks like web-authors don't factor
this into their code.

 We ended up reverting our changes due to incompatibilities seen in the
 wild and seek the spec amended before resuming our implementation in a
 compatible manner.

 What specific changes do you want to the spec?  As far as I can tell, right
 now the spec says nothing about when sheets become associated and that this
 would need to be defined, right?  Anything else?

I think you pinpointed the problem here: defining when the association
occurs (and also when none will happen) would remove the issue that we
see.

Thanks,
Julien


Re: [whatwg] Fullscreen

2011-10-04 Thread Chris Pearce
I've been working on implementing this spec in Firefox. We ended up 
diverging from it slightly, I've added a few notes in the proposed spec 
as to our changes. I'd like to see this turned into an official spec, 
and am happy to provide feedback etc.


Thanks!
Chris Pearce.


On 4/10/2011 5:52 a.m., Tantek Çelik wrote:

Hi Anne,

Fullscreen is currently #2 in my queue after getting another LCWD of CSS3-UI 
out.

I've been incrementally editing on the wiki page you mentioned until it's my 
primary focus.

Feel free to make edits to the wiki if there are particular aspects you want to 
improve or raise as issues.

Either way, though I sympathize with the desire to get rid of prefixes, there 
are other aspects (besides spec (re)formatting/massaging from wiki to W3C WD) 
that need more help if prefix-removal is your primary goal, e.g. we don't have 
a Fullscreen test suite nor even someone to curate/coordinate the creation of 
one - is that something you'd be available to help with?

Thanks,

Tantek

--Original Message--
From: Anne van Kesteren
Sender: whatwg-boun...@lists.whatwg.org
To: WHATWG
Subject: [whatwg] Fullscreen
Sent: Oct 3, 2011 01:17

Is anyone working on turning https://wiki.mozilla.org/Gecko:FullScreenAPI
into a standard? It would be nice to get rid of the prefixes. I'm willing
to work on it or help someone out if work is already going on. (I know I
offered doing this last year, but then some DOM4 things came up and I left
for three months. It should be better now.)






Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Ian Hickson
On Tue, 4 Oct 2011, Anne van Kesteren wrote:
 On Tue, 04 Oct 2011 23:15:01 +0200, Boris Zbarsky bzbar...@mit.edu wrote:
  A server has the option of declining _all_ non CORS request (e.g. all 
  requests without an Origin header).  Servers that care about others 
  getting at their images should do so.  Of course that relies on all 
  UAs implementing @crossorigin so that servers can require it when 
  linking to their images... But once we get there, this becomes a quite 
  viable strategy for the server to avoid leaking their images.
 
 I think http://dvcs.w3.org/hg/from-origin/raw-file/tip/Overview.html is 
 a better strategy for achieving that. The advantage being that only 
 changes on the server are required.

There's no way with this for the server to allow the client to use the 
image only if the origin is one of a few hundred origins, but not 
otherwise. (For example, allowing the image to be used by any google.* 
domain registered by Google, but not any other domain).

-- 
Ian Hickson   U+1047E)\._.,--,'``.fL
http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Ian Hickson
On Tue, 4 Oct 2011, Kenneth Russell wrote:
 
 The server only has the option of declining cross-origin access if the 
 application specified the crossorigin attribute. A hostile application 
 would simply not specify that attribute, would receive the tainted 
 image, and would use the timing attack I assume you're referring to to 
 infer the alpha channel.

A server can avoid that problem by simply not returning the image in that 
case.


 The far more common case today is that the server doesn't understand the 
 CORS request, not that it explicitly forbids cross-origin access to the 
 resource.

If it doesn't understand the request, there's no point adding the 
attribute in the first place.

-- 
Ian Hickson   U+1047E)\._.,--,'``.fL
http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'


Re: [whatwg] [CORS] WebKit tainting image instead of throwing error

2011-10-04 Thread Boris Zbarsky

On 10/4/11 5:25 PM, Anne van Kesteren wrote:

I think http://dvcs.w3.org/hg/from-origin/raw-file/tip/Overview.html is
a better strategy for achieving that.


Possibly.


The advantage being that only changes on the server are required.


Once all clients implement that proposal, yes?

-Boris